Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TOGBAD - an approach to detect routing attacks in tactical environments., , and . Security and Communication Networks, 4 (8): 793-806 (2011)A cooperative nearest neighbours topology control algorithm for wireless ad hoc networks., , , and . ICCCN, page 412-417. IEEE, (2003)About prefix hijacking in the Internet., and . LCN, page 143-146. IEEE Computer Society, (2011)MOBIP: Ein modulares Bildverarbeitungssystem mit Parallelrechner., and . Elektronische Rechenanlagen, 25 (2): 55-65 (1983)Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks., , and . ICDCS Workshops, page 213-220. IEEE Computer Society, (2010)A Flexible Dynamic Partitioning Algorithm for Optimistic Distributed Simulation., , and . PADS, page 219-228. IEEE Computer Society, (2007)Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD)., , and . ECEASST, (2011)Eine Erweiterung der Transportebene zur Bandbreitenregelung auf Ende-zu-Ende Basis., and . Praxis der Informationsverarbeitung und Kommunikation, 22 (1): 11-21 (1999)DOI:10.1515/piko.1999.22.1.3.Handoff Support for Mobilty with IP over Bluetooth., , , , , , and . LCN, page 143-154. IEEE Computer Society, (2000)Fairness and Delay/Loss Study of an End-to-End Bandwidth Regulation Scheme., and . LCN, page 315-324. IEEE Computer Society, (1998)